Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for authenticating a user based on mapping computing device with the user identity

a computing device and user identity technology, applied in the field of system and method for authenticating a user and a corresponding computing device, can solve the problems of cumbersome and tedious existing solutions for authenticating the computing device and the user, increase the complexity can be counterproductive, and reduce the cost of an infrastructure set up, so as to reduce the cost. , the effect of smooth and seamless

Active Publication Date: 2019-03-14
BELLBOI INC
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a system and method for authenticating users and customers through their computing devices and phone numbers, without the need for remembering passwords and usernames. It offers secure authentication even when the telecom operator's network is poor. Users are relieved from having to check OTPs and toggle between screens. The invention also creates a seamless log-in experience for users across all telecom service providers and computing devices. Additionally, it reduces the cost of infrastructure set up by mapping the user's phone number and the identification number of the computing device through the integrated telecom operators.

Problems solved by technology

However, this increased complexity can be counterproductive, as users find the passcodes harder to commit to memory and either record them in some non-volatile way, such as keeping a written record with the device to which the password relates or by making frequent requests for password reminders or resets.
If the telecom operator's network condition is poor, the authentication operation is difficult through OTP.
The existing solutions for authenticating the computing device and the users are cumbersome and tedious.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating a user based on mapping computing device with the user identity
  • System and method for authenticating a user based on mapping computing device with the user identity
  • System and method for authenticating a user based on mapping computing device with the user identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]Illustrative embodiments of the system and method of use of the present application are provided below. It will of course be appreciated that in the development of any actual embodiment, numerous implementation-specific decisions will be made to achieve the developer's specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.

[0026]The system and method of use in accordance with the present application overcomes one or more of the above-discussed problems commonly associated with conventional authentication systems. Specifically, the present invention provides for an improved and efficient means to authenticate a user and a corresponding computing device. These and other un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system to authenticate a user and a computing device includes a processing unit and a database which cause the processing unit to receive input from the user to select a wireless network; the wireless network having a specific IP address whitelisted by a wireless network solution provider; display a web-portal of the selected wireless network; receive a phone number of the user; receive a specified code from the user; provide the user with a predefined number of digits of an identification number of the computing device for use as a password; receive the predefined number of digits of the identification number of the computing device; and transmit a combination of the received predefined number of digits and a MSISDN to a server, the server transmits data to a telecom server and the telecom server initiates a search operation of the combination to authenticate the user on determining a match.

Description

BACKGROUND1. Field of the Invention[0001]The system of the present invention is related, in general, to a system and method to authenticate a user and a corresponding computing device, and specifically relates to a system and method to authenticate a user and a corresponding computing device by combining a identification number of the computing device with a mobile station international subscriber directory number (MSISDN).2. Description of Related Art[0002]Traditional authentication systems and methods use personal identification numbers (PINs), requiring the user to remember a fixed short sequence of digits. At each authentication attempt, the user provides this PIN. PINs can be made more secure by increasing their complexity, for example by making them longer, or requiring mixtures of upper and lower case letters and numerical digits. However, this increased complexity can be counterproductive, as users find the passcodes harder to commit to memory and either record them in some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/08H04W8/20H04W12/06H04W12/02H04W48/02H04L29/06H04L9/32
CPCH04W12/08H04W8/20H04W12/06H04W12/02H04W48/02H04L63/083H04L9/3226H04L63/101H04L9/3234H04W48/18
Inventor PITTI, ABHISHEK
Owner BELLBOI INC